Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference30 articles.
1. Benaloh J, Leichter J (1989) Generalized secret sharing and monotone functions, Proc. Crypto’88, Lecture Notes in Computer Science. Springer, Berlin, pp 213–222
2. Blakley GR (1979) Safeguarding cryptographic keys. Proc AFIPS Natl Comput Conf 48:313–317
3. Chang CC, Lee HC (1993) New generalized group-oriented cryptoscheme without trusted centers. J IEEE J Sel Areas Commun 11(5):725–729
4. Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing scheme. J Pattern Recognit Lett 33(1):83–91
5. Guo C, Chang CC, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. J Pattern Recognit Lett 33(12):1594–1600
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献